<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Network Security Guidelines in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632130#M733570</link>
    <description>The short answer: Disable everything, then re-enable only what you need.&lt;BR /&gt;&lt;BR /&gt;All standard HP-UX network services can be disabled by editing either /etc/inetd.conf or the files in /etc/rc.config.d/.&lt;BR /&gt;&lt;BR /&gt;MK</description>
    <pubDate>Wed, 12 May 2010 06:32:08 GMT</pubDate>
    <dc:creator>Matti_Kurkela</dc:creator>
    <dc:date>2010-05-12T06:32:08Z</dc:date>
    <item>
      <title>Network Security Guidelines</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632129#M733569</link>
      <description>Hi All,&lt;BR /&gt;&lt;BR /&gt;I am working on some servers that are under installation (HP-UX 11.31) on Blade Servers. Post installation I had to implement network security features for preventing unauthorised access.&lt;BR /&gt;&lt;BR /&gt;Please give some inputs like what all the ports/services should be disabled etc. and also provide some support document.&lt;BR /&gt;&lt;BR /&gt;Thanks &amp;amp; Regards:&lt;BR /&gt;Arun Jain</description>
      <pubDate>Wed, 12 May 2010 06:08:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632129#M733569</guid>
      <dc:creator>Arun Jain</dc:creator>
      <dc:date>2010-05-12T06:08:10Z</dc:date>
    </item>
    <item>
      <title>Re: Network Security Guidelines</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632130#M733570</link>
      <description>The short answer: Disable everything, then re-enable only what you need.&lt;BR /&gt;&lt;BR /&gt;All standard HP-UX network services can be disabled by editing either /etc/inetd.conf or the files in /etc/rc.config.d/.&lt;BR /&gt;&lt;BR /&gt;MK</description>
      <pubDate>Wed, 12 May 2010 06:32:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632130#M733570</guid>
      <dc:creator>Matti_Kurkela</dc:creator>
      <dc:date>2010-05-12T06:32:08Z</dc:date>
    </item>
    <item>
      <title>Re: Network Security Guidelines</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632131#M733571</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;The document below is DISA's unix security checklist. It includes hp-ux too. &lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://iase.disa.mil/stigs/checklist/unix_checklist_v5r1-19_20090815.zip" target="_blank"&gt;http://iase.disa.mil/stigs/checklist/unix_checklist_v5r1-19_20090815.zip&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 12 May 2010 06:35:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632131#M733571</guid>
      <dc:creator>Burak Topal</dc:creator>
      <dc:date>2010-05-12T06:35:12Z</dc:date>
    </item>
    <item>
      <title>Re: Network Security Guidelines</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632132#M733572</link>
      <description>Hi Arun,&lt;BR /&gt;&lt;BR /&gt;Attached the standard netwok security settings which  we used to do before server rollout. It seems  to be helpful to you.&lt;BR /&gt;&lt;BR /&gt;Gudluck&lt;BR /&gt;Prasanth</description>
      <pubDate>Wed, 12 May 2010 06:39:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632132#M733572</guid>
      <dc:creator>Prasanth V Aravind</dc:creator>
      <dc:date>2010-05-12T06:39:11Z</dc:date>
    </item>
    <item>
      <title>Re: Network Security Guidelines</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632133#M733573</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Perform the following to disable standard inetd-based services: &lt;BR /&gt;1.  Change to the /etc directory &lt;BR /&gt;2.  Open inetd.conf &lt;BR /&gt;3.  Disable the following services by adding a comment character (#) to the beginning of its definition:  &lt;BR /&gt;â ¢ echo &lt;BR /&gt;â ¢ discard &lt;BR /&gt;â ¢ daytime &lt;BR /&gt;â ¢ chargen &lt;BR /&gt;â ¢ dtspc &lt;BR /&gt;â ¢ exec &lt;BR /&gt;â ¢ ntalk &lt;BR /&gt;â ¢ rpc.rwalld &lt;BR /&gt;â ¢ rpc.sprayd &lt;BR /&gt;â ¢ rpc.cmsd &lt;BR /&gt;â ¢ kcms_server &lt;BR /&gt;â ¢ printer &lt;BR /&gt;â ¢ shell &lt;BR /&gt;â ¢ login&lt;BR /&gt;â ¢ finger &lt;BR /&gt;â ¢ uucp &lt;BR /&gt;â ¢ ident &lt;BR /&gt;â ¢ auth &lt;BR /&gt;â ¢ instl_boots &lt;BR /&gt;â ¢ registrar &lt;BR /&gt;â ¢ recserv &lt;BR /&gt;â ¢ rpc.rstatd &lt;BR /&gt;â ¢ rpc.rusersd &lt;BR /&gt;â ¢ bootps &lt;BR /&gt;â ¢ kshell &lt;BR /&gt;â ¢ klogin &lt;BR /&gt;â ¢ rpc.rquotad &lt;BR /&gt;â ¢ rpc.ttdbserver&lt;BR /&gt;4. Save inetd.conf.  &lt;BR /&gt;5. Set root as the owner of inetd.conf. &lt;BR /&gt;6. Set sys as the group owner of inetd.conf. &lt;BR /&gt;7. Restrict write access to inetd.conf to the file owner. &lt;BR /&gt;8. Remove the executable and sticky bit from inetd.conf. &lt;BR /&gt;9. Invoke inetd to reread itâ  s config file: inetd -c &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Aneesh</description>
      <pubDate>Wed, 12 May 2010 06:49:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632133#M733573</guid>
      <dc:creator>Aneesh Mohan</dc:creator>
      <dc:date>2010-05-12T06:49:26Z</dc:date>
    </item>
    <item>
      <title>Re: Network Security Guidelines</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632134#M733574</link>
      <description>&lt;BR /&gt;Disable login prompts on serial ports:-&lt;BR /&gt;=======================================&lt;BR /&gt;&lt;BR /&gt;If there is not a mission-critical need to provide login capability from any serial ports (such as for a modem) then disabling the login: prompt on the system serial devices reduces the risk of unauthorised access via these ports.&lt;BR /&gt;Note that this action may safely be performed even if console access to the system is provided via the serial ports, as the line in the /etc/inittab file that corresponds to the console does not match the supplied pattern (i.e., it doesnâ  t contain the string â  ttyâ  ).&lt;BR /&gt;&lt;BR /&gt;Perform the following to disable the login: prompt on the system serial devices: &lt;BR /&gt;1. Open /etc/inittab. &lt;BR /&gt;2. Disable each getty instance associated with a tty device by adding a comment character (#) to the beginning of the line. &lt;BR /&gt;3. Save /etc/inittab.* &lt;BR /&gt;</description>
      <pubDate>Wed, 12 May 2010 06:58:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632134#M733574</guid>
      <dc:creator>Aneesh Mohan</dc:creator>
      <dc:date>2010-05-12T06:58:01Z</dc:date>
    </item>
    <item>
      <title>Re: Network Security Guidelines</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632135#M733575</link>
      <description>&lt;BR /&gt;Disable NIS/NIS+ related process if possible&lt;BR /&gt;=====================================&lt;BR /&gt;&lt;BR /&gt;Disable NIS/NIS+ related processes. &lt;BR /&gt;Network Information Service (NIS) is a distributed database providing centralised control of names, addresses, services, and key configuration files throughout a network of servers and clients.  NIS was formerly known as Yellow Pages (YP).  &lt;BR /&gt; NIS+ is a replacement for NIS services, and is more scalable, flexible, and secure.  It adds a security system with authentication and authorization services to validate users on the network and to determine if they allowed to access or modify the information requested. &lt;BR /&gt;However, both systems have known security vulnerabilities, and have been an entry point for security attacks.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Eliminate exposure to NIS/NIS+ vulnerabilities by not running related daemons on hosts that are not NIS/NIS+ servers or clients.&lt;BR /&gt;&lt;BR /&gt;Perform the following to disable the startup of NIS/NIS+ related processes: &lt;BR /&gt;ch_rc -a -p NIS_MASTER_SERVER=0 -p NIS_SLAVE_SERVER=0 \ &lt;BR /&gt;  -p NIS_CLIENT=0 -p NISPLUS_SERVER=0 \ &lt;BR /&gt;  -p NISPLUS_CLIENT=0 /etc/rc.config.d/namesvrs  &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Aneesh</description>
      <pubDate>Wed, 12 May 2010 06:59:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632135#M733575</guid>
      <dc:creator>Aneesh Mohan</dc:creator>
      <dc:date>2010-05-12T06:59:27Z</dc:date>
    </item>
    <item>
      <title>Re: Network Security Guidelines</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632136#M733576</link>
      <description>Disable the CDE GUI login, if possible&lt;BR /&gt;=======================================&lt;BR /&gt;&lt;BR /&gt;CDE stands for "Common Desktop Environment," and is an environment for logging on to and interacting with your system via an X-windows type GUI interface from the console.  Intended for use with workstation or desktop systems, this service is not commonly used with the server-class systems or in large enterprise environments. &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;The X Windows-based CDE GUI on HP-UX systems has had a history of security issues, and should be disabled if unused.&lt;BR /&gt;&lt;BR /&gt;Perform the following to disable the GUI login: &lt;BR /&gt;ch_rc -a -p DESKTOP="" /etc/rc.config.d/desktop  &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Aneesh</description>
      <pubDate>Wed, 12 May 2010 07:00:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632136#M733576</guid>
      <dc:creator>Aneesh Mohan</dc:creator>
      <dc:date>2010-05-12T07:00:46Z</dc:date>
    </item>
    <item>
      <title>Re: Network Security Guidelines</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632137#M733577</link>
      <description>Disable email server, if possible&lt;BR /&gt;==================================&lt;BR /&gt;&lt;BR /&gt;Disable the sendmail daemon to avoid processing incoming email. &lt;BR /&gt; It is possible to run a Unix system with the Sendmail daemon disabled and still allow users on that system to send email out from that machine.  Running Sendmail in "daemon mode" &lt;BR /&gt;(with the -bd command-line option) is only required on machines that act as mail servers, receiving and processing email from other hosts on the network.  The remediation will result in a machine that can send email but not receive it. &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Avoid potential vulnerabilities in the sendmail server if incoming email service is not used.&lt;BR /&gt;&lt;BR /&gt;Perform the following to disable the sendmail server:&lt;BR /&gt;1.  Set the SENDMAIL_SERVER parameter to zero in the mailservs system configuration file. &lt;BR /&gt;2.  Setup a cron job to run sendmail at regular intervals (e.g. every hour) in order to process queued, outgoing mail. &lt;BR /&gt;The following script will perform the above procedure: &lt;BR /&gt;ch_rc -a -p SENDMAIL_SERVER=0 /etc/rc.config.d/mailservs  &lt;BR /&gt;cd /var/spool/cron/crontabs &lt;BR /&gt;crontab -l &amp;gt;root.tmp &lt;BR /&gt;echo '0 * * * * /usr/lib/sendmail -q' &amp;gt;&amp;gt;root.tmp &lt;BR /&gt;crontab root.tmp &lt;BR /&gt;rm -f root.tmp &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Aneesh</description>
      <pubDate>Wed, 12 May 2010 07:01:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632137#M733577</guid>
      <dc:creator>Aneesh Mohan</dc:creator>
      <dc:date>2010-05-12T07:01:37Z</dc:date>
    </item>
    <item>
      <title>Re: Network Security Guidelines</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632138#M733578</link>
      <description>Disable SNMP and OpenView Agents, if remote management or monitoring is not needed. &lt;BR /&gt;=====================================&lt;BR /&gt;&lt;BR /&gt;If SNMP and OpenView agents are not needed, avoid potential security vulnerabilities in these programs by disabling them.&lt;BR /&gt;&lt;BR /&gt;Perform the following to disable the SNMP and OpenView Agents: &lt;BR /&gt;cd /sbin/rc2.d &lt;BR /&gt;mv -f S570SnmpFddi .NOS570SnmpFddi &lt;BR /&gt; &lt;BR /&gt;ch_rc -a -p SNMP_HPUNIX_START=0 \ &lt;BR /&gt;  /etc/rc.config.d/SnmpHpunix &lt;BR /&gt;ch_rc -a -p SNMP_MASTER_START=0 \ &lt;BR /&gt;  /etc/rc.config.d/SnmpMaster &lt;BR /&gt;ch_rc -a -p SNMP_MIB2_START=0 \ &lt;BR /&gt;  /etc/rc.config.d/SnmpMib2 &lt;BR /&gt;ch_rc -a -p SNMP_TRAPDEST_START=0 \ &lt;BR /&gt;  /etc/rc.config.d/SnmpTrpDst &lt;BR /&gt;ch_rc â  a â  p OSPFMIB=0 \ &lt;BR /&gt;  /etc/rc.config.d/netdaemons &lt;BR /&gt;ch_rc â  a â  p OPCAGT=0 \ &lt;BR /&gt;  /etc/rc.config.d/opcagt &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Aneesh</description>
      <pubDate>Wed, 12 May 2010 07:02:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632138#M733578</guid>
      <dc:creator>Aneesh Mohan</dc:creator>
      <dc:date>2010-05-12T07:02:44Z</dc:date>
    </item>
    <item>
      <title>Re: Network Security Guidelines</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632139#M733579</link>
      <description>Network parameter modifications&lt;BR /&gt;===============================&lt;BR /&gt;&lt;BR /&gt;Network parameter default values should align with current best practices unless there is a specific need to use other values.&lt;BR /&gt;&lt;BR /&gt;Perform the following to update the default network parameter values: &lt;BR /&gt;1.  Change to the /etc/rc.config.d directory &lt;BR /&gt;2.  Open nddconf and review the comment lines on how to use the configuration file &lt;BR /&gt;3.  Set each of the following network parameters to the recommended value.  If a parameter does not have an entry in nddconf then add a new entry to the end of the file while properly incrementing the parameter index:  &lt;BR /&gt;TRANSPORT_NAME, NDD_NAME, NDD_VALUE &lt;BR /&gt;tcp  tcp_syn_rcvd_max  4096&lt;BR /&gt;arp  arp_cleanup_interval  60000&lt;BR /&gt;ip  ip_forward_src_routed  0&lt;BR /&gt;ip  ip_forward_directed_broadcasts  0&lt;BR /&gt;ip  ip_respond_to_timestamp  0&lt;BR /&gt;ip  ip_respond_to_timestamp_broadcast  0&lt;BR /&gt;ip  ip_respond_to_address_mask_broadcast  0&lt;BR /&gt;ip  ip_respond_to_echo_broadcast  0&lt;BR /&gt;4.  Save nddconf.&lt;BR /&gt;  &lt;BR /&gt;If creating this file for the first time: &lt;BR /&gt;1.  Set root as the owner of nddconf. &lt;BR /&gt;2.  Set sys as the group owner of nddconf. &lt;BR /&gt;3.  Restrict write access to nddconf to the file owner. &lt;BR /&gt;4.  Remove the executable and sticky bit from nddconf.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Aneesh</description>
      <pubDate>Wed, 12 May 2010 07:03:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632139#M733579</guid>
      <dc:creator>Aneesh Mohan</dc:creator>
      <dc:date>2010-05-12T07:03:36Z</dc:date>
    </item>
    <item>
      <title>Re: Network Security Guidelines</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632140#M733580</link>
      <description>Additional network parameter modifications&lt;BR /&gt;=========================================&lt;BR /&gt;Configure networking to NOT forward TCP/IP packets between multiple networks, even if the machine has multiple network adapters connected to multiple networks.&lt;BR /&gt;&lt;BR /&gt;System is not going to be used as a firewall or gateway to pass network traffic between different networks.&lt;BR /&gt;&lt;BR /&gt;1.  Change to the /etc/rc.config.d directory &lt;BR /&gt;2.  Open nddconf and review the comment lines on how to use the configuration file &lt;BR /&gt;3.  Set each of the following network parameters to the recommended value.  If a parameter does not have an entry in nddconf then add a new entry to the end of the file while properly incrementing the parameter index: &lt;BR /&gt;TRANSPORT_NAME  NDD_NAME  NDD_VALUE&lt;BR /&gt;ip  ip_forwarding   0&lt;BR /&gt;ip  ip_send_redirects  0&lt;BR /&gt;4.  Save nddconf. &lt;BR /&gt;If creating this file for the first time: &lt;BR /&gt;5.  Set root as the owner of nddconf. &lt;BR /&gt;6.  Set sys as the group owner of nddconf. &lt;BR /&gt;7.  Restrict write access to nddconf to the file owner. &lt;BR /&gt;8.  Remove the executable and sticky bit from nddconf&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Aneesh</description>
      <pubDate>Wed, 12 May 2010 07:05:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632140#M733580</guid>
      <dc:creator>Aneesh Mohan</dc:creator>
      <dc:date>2010-05-12T07:05:15Z</dc:date>
    </item>
    <item>
      <title>Re: Network Security Guidelines</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632141#M733581</link>
      <description>Hi burak,&lt;BR /&gt;&lt;BR /&gt;Your link is not working. If possible, please attach it directly to the thread...&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;Arun</description>
      <pubDate>Wed, 12 May 2010 07:13:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632141#M733581</guid>
      <dc:creator>Arun Jain</dc:creator>
      <dc:date>2010-05-12T07:13:30Z</dc:date>
    </item>
    <item>
      <title>Re: Network Security Guidelines</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632142#M733582</link>
      <description>Sorry, the doc is a little greater than the allowed size(1.12mb), but you can find under &lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://iase.disa.mil/stigs/checklist/" target="_blank"&gt;http://iase.disa.mil/stigs/checklist/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;with the name &lt;BR /&gt;&lt;BR /&gt;UNIX Security Checklist Version 5, Release 1.24 - Updated! posted Apr 20, 2010&lt;BR /&gt;&lt;BR /&gt;Regards,</description>
      <pubDate>Wed, 12 May 2010 07:45:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632142#M733582</guid>
      <dc:creator>Burak Topal</dc:creator>
      <dc:date>2010-05-12T07:45:28Z</dc:date>
    </item>
    <item>
      <title>Re: Network Security Guidelines</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632143#M733583</link>
      <description>Bastille is a good start. It will take care of most of the low hanging fruit. CIS benchmarks are also good &lt;A href="http://cisecurity.org/en-us/?route=default." target="_blank"&gt;http://cisecurity.org/en-us/?route=default.&lt;/A&gt;  For more advanced help, go to the SANS.org reading room &lt;A href="http://www.sans.org/reading_room/" target="_blank"&gt;http://www.sans.org/reading_room/&lt;/A&gt;  and search 'securing hp-ux'. A lot of what you have to do depends on how you are going to use the box. A workstation in a lab is going to be done differently than a web server.&lt;BR /&gt;&lt;BR /&gt;Fred</description>
      <pubDate>Wed, 26 May 2010 13:22:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/network-security-guidelines/m-p/4632143#M733583</guid>
      <dc:creator>Fred K. Abell Jr._1</dc:creator>
      <dc:date>2010-05-26T13:22:00Z</dc:date>
    </item>
  </channel>
</rss>

